Mary Theofanos and Yasemin Acar
Welcome to USEC
View More Papers
Analyzing and Creating Malicious URLs: A Comparative Study on...
Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)
Read MoreVision: Comparison of AI-assisted Policy Development Between Professionals and...
Rishika Thorat (Purdue University), Tatiana Ringenberg (Purdue University)
Read MoreFrom Scam to Safety: Participatory Design of Digital Privacy...
Sarah Tabassum (University of North Carolina at Charlotte, USA), Narges Zare (University of North Carolina at Charlotte, USA), Cori Faklaris(University of North Carolina at Charlotte, USA)
Read More